default search action
Search dblp for Publications
export results for "stream:conf/isba:"
@inproceedings{DBLP:conf/isba/AnandK19, author = {Vijay Anand and Vivek Kanhangad}, title = {Deep Convolutional Neural Network for Dot and Incipient Ridge Detection in High-resolution Fingerprints}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778527}, doi = {10.1109/ISBA.2019.8778527}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/AnandK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/BanerjeeMR19, author = {Sudipta Banerjee and Vahid Mirjalili and Arun Ross}, title = {Spoofing {PRNU} Patterns of Iris Sensors while Preserving Iris Recognition}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778483}, doi = {10.1109/ISBA.2019.8778483}, timestamp = {Mon, 05 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/BanerjeeMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/DixitB19, author = {Anuja Dixit and Soumen Bag}, title = {Utilization of {HOG-SVD} based Features with Connected Component Labeling for Multiple Copy-move Image Forgery Detection}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778494}, doi = {10.1109/ISBA.2019.8778494}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/DixitB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/GargBK19, author = {Sachin Garg and Shruti Bhilare and Vivek Kanhangad}, title = {Subband Analysis for Performance Improvement of Replay Attack Detection in Speaker Verification Systems}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778535}, doi = {10.1109/ISBA.2019.8778535}, timestamp = {Mon, 05 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/GargBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/GaviniMA19, author = {Yaswanth Gavini and Babu M. Mehtre and Arun Agarwal}, title = {Thermal to Visual Face Recognition using Transfer Learning}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778474}, doi = {10.1109/ISBA.2019.8778474}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/GaviniMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/HuangKSHS19, author = {Jiaju Huang and Bryan Klee and Daniel Schuckers and Daqing Hou and Stephanie Schuckers}, title = {Removing Personally Identifiable Information from Shared Dataset for Keystroke Authentication Research}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778628}, doi = {10.1109/ISBA.2019.8778628}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/HuangKSHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/JalilianU19, author = {Ehsaneddin Jalilian and Andreas Uhl}, title = {Enhanced Segmentation-CNN based Finger-Vein Recognition by Joint Training with Automatically Generated and Manual Labels}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778522}, doi = {10.1109/ISBA.2019.8778522}, timestamp = {Mon, 05 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/JalilianU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/RajaRB19, author = {Kiran B. Raja and Ramachandra Raghavendra and Christoph Busch}, title = {Towards Reducing the Error Rates in Template Protection for Iris Recognition Using Custom Cuckoo Filters}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778470}, doi = {10.1109/ISBA.2019.8778470}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/RajaRB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/RamachandraVRB19, author = {Raghavendra Ramachandra and Sushma Venkatesh and Kiran B. Raja and Christoph Busch}, title = {Towards making Morphing Attack Detection robust using hybrid Scale-Space Colour Texture Features}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778488}, doi = {10.1109/ISBA.2019.8778488}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/RamachandraVRB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/RibeiroUA19, author = {Eduardo Ribeiro and Andreas Uhl and Fernando Alonso{-}Fernandez}, title = {Super-Resolution and Image Re-projection for Iris Recognition}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778581}, doi = {10.1109/ISBA.2019.8778581}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/RibeiroUA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/RoyB19, author = {Priyanka Roy and Soumen Bag}, title = {Forensic Performance on Handwriting to Identify Forgery Owing to Word Alteration}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778490}, doi = {10.1109/ISBA.2019.8778490}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/RoyB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SinghAPJN19, author = {Avantika Singh and Ashish Arora and Shreya Hasmukh Patel and Gaurav Jaswal and Aditya Nigam}, title = {FDFNet: {A} Secure Cancelable Deep Finger Dorsal Template Generation Network Secured via. Bio-Hashing}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778520}, doi = {10.1109/ISBA.2019.8778520}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/SinghAPJN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SinghJN19, author = {Avantika Singh and Gaurav Jaswal and Aditya Nigam}, title = {FDSNet: Finger dorsal image spoof detection network using light field camera}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778453}, doi = {10.1109/ISBA.2019.8778453}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/SinghJN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SinghMS19, author = {Malvika Singh and Babu M. Mehtre and S. Sangeetha}, title = {User Behavior Profiling using Ensemble Approach for Insider Threat Detection}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778466}, doi = {10.1109/ISBA.2019.8778466}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/SinghMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ThaparJNK19, author = {Daksh Thapar and Gaurav Jaswal and Aditya Nigam and Vivek Kanhangad}, title = {PVSNet: Palm Vein Authentication Siamese Network Trained using Triplet Loss and Adaptive Hard Mining by Learning Enforced Domain Specific Features}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778623}, doi = {10.1109/ISBA.2019.8778623}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/ThaparJNK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/TulyakovSSG19, author = {Sergey Tulyakov and Nishant Sankaran and Srirangaraj Setlur and Venu Govindaraju}, title = {Utilizing Template Diversity for Fusion Of Face Recognizers}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778556}, doi = {10.1109/ISBA.2019.8778556}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/TulyakovSSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/VivekanandanSR19, author = {Manojkumar Vivekanandan and V. N. Sastry and U. Srinivasulu Reddy}, title = {Biometric based User Authentication Protocol for Mobile Cloud Environment}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778529}, doi = {10.1109/ISBA.2019.8778529}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/VivekanandanSR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/VoruguntiGP19, author = {Chandra Sekhar Vorugunti and Devanur S. Guru and Viswanath Pulabaigari}, title = {An Efficient Online Signature Verification Based on Feature Fusion and Interval Valued Representation of Writer Specific Features}, booktitle = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISBA.2019.8778566}, doi = {10.1109/ISBA.2019.8778566}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/VoruguntiGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isba/2019, title = {5th {IEEE} International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2019, Hyderabad, India, January 22-24, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8767100/proceeding}, isbn = {978-1-7281-0532-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/AbavisaniP18, author = {Mahdi Abavisani and Vishal M. Patel}, title = {Adversarial domain adaptive subspace clustering}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311478}, doi = {10.1109/ISBA.2018.8311478}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/AbavisaniP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/AlsolamiAB18, author = {Fahad Alsolami and Bayan Alzahrani and Terrance E. Boult}, title = {Cloud-ID-Screen: Secure fingerprint data in the cloud}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311461}, doi = {10.1109/ISBA.2018.8311461}, timestamp = {Fri, 23 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/AlsolamiAB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/AlsufyaniAHD18, author = {Nawal Alsufyani and Asad Ali and Sanaul Hoque and Farzin Deravi}, title = {Biometrie presentation attack detection using gaze alignment}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311472}, doi = {10.1109/ISBA.2018.8311472}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/AlsufyaniAHD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ChengSGW18, author = {Yao Cheng and Hendra Saputra and Leng Meng Goh and Yongdong Wu}, title = {Secure smart metering based on LoRa technology}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311466}, doi = {10.1109/ISBA.2018.8311466}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/ChengSGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/GuoNC18, author = {Bingchen H. Guo and Mark S. Nixon and John N. Carter}, title = {Fusion analysis of soft biometrics for recognition at a distance}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311457}, doi = {10.1109/ISBA.2018.8311457}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/GuoNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/JohnsonYRHS18, author = {Morgan Johnson and David Yambay and Dan Rissacher and Laura Holsopple and Stephanie Schuckers}, title = {A longitudinal study of iris recognition in children}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311468}, doi = {10.1109/ISBA.2018.8311468}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/JohnsonYRHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/JomaaIM18, author = {Rami Mohammad Jomaa and Md. Saiful Islam and Hassan Mathkour}, title = {Improved sequential fusion of heart-signal and fingerprint for anti-spoofing}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311476}, doi = {10.1109/ISBA.2018.8311476}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/JomaaIM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/KorshunovGVSM18, author = {Pavel Korshunov and Andr{\'{e}} R. Gon{\c{c}}alves and Ricardo P. V. Violato and Fl{\'{a}}vio Olmos Sim{\~{o}}es and S{\'{e}}bastien Marcel}, title = {On the use of convolutional neural networks for speech presentation attack detection}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311474}, doi = {10.1109/ISBA.2018.8311474}, timestamp = {Tue, 22 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/KorshunovGVSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/KrivokucaM18, author = {Vedrana Krivokuca and S{\'{e}}bastien Marcel}, title = {Towards quantifying the entropy of fingervein patterns across different feature extractors}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311473}, doi = {10.1109/ISBA.2018.8311473}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/KrivokucaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/KumarKP18, author = {Rajesh Kumar and Partha Pratim Kundu and Vir V. Phoha}, title = {Continuous authentication using one-class classifiers and their fusion}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311467}, doi = {10.1109/ISBA.2018.8311467}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/KumarKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/LiuKGYYJ18, author = {Xiaofeng Liu and B. V. K. Vijaya Kumar and Yubin Ge and Chao Yang and Jane You and Ping Jia}, title = {Normalized face image generation with perceptron generative adversarial networks}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311462}, doi = {10.1109/ISBA.2018.8311462}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/LiuKGYYJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/LiuT18, author = {Xing Liu and Kar{-}Ann Toh}, title = {A novel set of pixel difference-based features for pedestrian detection}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311456}, doi = {10.1109/ISBA.2018.8311456}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/LiuT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/LiuZW18, author = {Yuting Liu and Qijun Zhao and Zhihong Wu}, title = {Pooling body parts on feature maps for misalignment robust person re-identification}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311470}, doi = {10.1109/ISBA.2018.8311470}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/LiuZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/NealW18, author = {Tempestt J. Neal and Damon L. Woodard}, title = {A gender-specific behavioral analysis of mobile device usage data}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311459}, doi = {10.1109/ISBA.2018.8311459}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/NealW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/PanD18, author = {Shi Pan and Farzin Deravi}, title = {Facial biometrie presentation attack detection using temporal texture co-occurrence}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311464}, doi = {10.1109/ISBA.2018.8311464}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/PanD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ParimiKP18, author = {Gayathri Manogna Parimi and Partha Pratim Kundu and Vir V. Phoha}, title = {Analysis of head and torso movements for authentication}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311460}, doi = {10.1109/ISBA.2018.8311460}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/ParimiKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/QiLS18, author = {Xuan Qi and Chen Liu and Stephanie Schuckers}, title = {{CNN} based key frame extraction for face in video recognition}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311477}, doi = {10.1109/ISBA.2018.8311477}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/QiLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/RaghavendraVRGB18, author = {Ramachandra Raghavendra and Narayan Vetrekar and Kiran B. Raja and Rajendra S. Gad and Christoph Busch}, title = {Robust gender classification using extended multi-spectral imaging by exploring the spectral angle mapper}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311455}, doi = {10.1109/ISBA.2018.8311455}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/RaghavendraVRGB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/RajannaMBH18, author = {Vijay Rajanna and Adil Hamid Malla and Rahul Ashok Bhagat and Tracy Hammond}, title = {DyGazePass: {A} gaze gesture-based dynamic authentication system to counter shoulder surfing and video analysis attacks}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311458}, doi = {10.1109/ISBA.2018.8311458}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/RajannaMBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SinghMYN18, author = {Avantika Singh and Vishesh Mistry and Dhananjay Yadav and Aditya Nigam}, title = {GHCLNet: {A} generalized hierarchically tuned contact lens detection network}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311471}, doi = {10.1109/ISBA.2018.8311471}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/SinghMYN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SuDT18, author = {Le Su and Dinil Mon Divakaran and Vrizlynn L. L. Thing}, title = {Privacy preserving {IP} traceback}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311469}, doi = {10.1109/ISBA.2018.8311469}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/SuDT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/TakabiHD18, author = {Hassan Takabi and Yessir Hashem and Ram Dantu}, title = {Prediction of human error using eye movements patterns for unintentional insider threat detection}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311479}, doi = {10.1109/ISBA.2018.8311479}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/TakabiHD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/TapiaA18, author = {Juan E. Tapia and C. Carlos Aravena}, title = {Gender classification from periocular {NIR} images using fusion of CNNs models}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311465}, doi = {10.1109/ISBA.2018.8311465}, timestamp = {Fri, 25 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/TapiaA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ThaparNAA18, author = {Daksh Thapar and Aditya Nigam and Divyansh Aggarwal and Punjal Agarwal}, title = {VGR-net: {A} view invariant gait recognition network}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311475}, doi = {10.1109/ISBA.2018.8311475}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/ThaparNAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/WuZS18, author = {Chen Wu and Yuanlin Zhang and Yonghong Song}, title = {Multi-view gait recognition using 2D-EGEI and {NMF}}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311463}, doi = {10.1109/ISBA.2018.8311463}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/WuZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isba/2018, title = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8306019/proceeding}, isbn = {978-1-5386-2248-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/AjijP17, author = {Md. Ajij and Sanjoy Pratihar}, title = {Quasi-straightness based features for off-line verification of signatures}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947708}, doi = {10.1109/ISBA.2017.7947708}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/isba/AjijP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/AnandK17, author = {Vijay Anand and Vivek Kanhangad}, title = {Pore based indexing for High-Resolution Fingerprints}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947685}, doi = {10.1109/ISBA.2017.7947685}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/AnandK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/BadalNA17, author = {Tapas Badal and Neeta Nain and Mushtaq Ahmed}, title = {Multi-object trajectory coupling using online target specific decision making}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947702}, doi = {10.1109/ISBA.2017.7947702}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/BadalNA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/Blanco-GonzaloS17, author = {Ramon Blanco{-}Gonzalo and Raul S{\'{a}}nchez{-}Reillo and Judith Liu{-}Jimenez and Carlos Sanchez{-}Redondo}, title = {How to assess user interaction effects in Biometric performance}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947699}, doi = {10.1109/ISBA.2017.7947699}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/Blanco-GonzaloS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/BuriroCZ17, author = {Attaullah Buriro and Bruno Crispo and Yury Zhauniarovich}, title = {Please hold on: Unobtrusive user authentication using smartphone's built-in sensors}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947684}, doi = {10.1109/ISBA.2017.7947684}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/BuriroCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/CekerU17, author = {Hayreddin {\c{C}}eker and Shambhu J. Upadhyaya}, title = {Transfer learning in long-text keystroke dynamics}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947710}, doi = {10.1109/ISBA.2017.7947710}, timestamp = {Fri, 16 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/CekerU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ChenDSR17, author = {Cunjian Chen and Antitza Dantcheva and Thomas Swearingen and Arun Ross}, title = {Spoofing faces using makeup: An investigative study}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947686}, doi = {10.1109/ISBA.2017.7947686}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/ChenDSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ChenSWY17, author = {Yufei Chen and Chao Shen and Zhao Wang and Tianwen Yu}, title = {Modeling interactive sensor-behavior with smartphones for implicit and active user authentication}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947694}, doi = {10.1109/ISBA.2017.7947694}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/ChenSWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/DharA17, author = {Prithviraj Dhar and Azadeh Alavi}, title = {Analysis of adaptability of deep features for verifying blurred and cross-resolution images}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947679}, doi = {10.1109/ISBA.2017.7947679}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/DharA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/Gonzalez-SosaVF17, author = {Ester Gonzalez{-}Sosa and Rub{\'{e}}n Vera{-}Rodr{\'{\i}}guez and Julian Fi{\'{e}}rrez and Vishal M. Patel}, title = {Millimetre wave person recognition: Hand-crafted vs learned features}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947692}, doi = {10.1109/ISBA.2017.7947692}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/Gonzalez-SosaVF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/HaqueNM17, author = {Mohammad A. Haque and Kamal Nasrollahi and Thomas B. Moeslund}, title = {Pain expression as a biometric: Why patients' self-reported pain doesn't match with the objectively measured pain?}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947690}, doi = {10.1109/ISBA.2017.7947690}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/HaqueNM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/HuangHS17, author = {Jiaju Huang and Daqing Hou and Stephanie Schuckers}, title = {A practical evaluation of free-text keystroke dynamics}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947695}, doi = {10.1109/ISBA.2017.7947695}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/HuangHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/HuangLZNZL17, author = {Houjun Huang and Shilei Liu and He Zheng and Liao Ni and Yi Zhang and Wenxin Li}, title = {DeepVein: Novel finger vein verification methods based on Deep Convolutional Neural Networks}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947683}, doi = {10.1109/ISBA.2017.7947683}, timestamp = {Wed, 14 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/HuangLZNZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/IbrahimS17, author = {Nasiru Ibrahim and Harin Sellahewa}, title = {Touch gesture-based authentication: {A} security analysis of Pattern Unlock}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947711}, doi = {10.1109/ISBA.2017.7947711}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/IbrahimS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/JainDVK17, author = {Hardik Jain and Joydeep Das and Hemant Kumar Verma and Nitin Khanna}, title = {An enhanced statistical approach for median filtering detection using difference image}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947704}, doi = {10.1109/ISBA.2017.7947704}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/JainDVK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/JaswalNN17, author = {Gaurav Jaswal and Aditya Nigam and Ravinder Nath}, title = {Finger knuckle image based personal authentication using DeepMatching}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947706}, doi = {10.1109/ISBA.2017.7947706}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/JaswalNN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/KapoorBH17, author = {Aditi Kapoor and K. K. Biswas and Madasu Hanmandlu}, title = {Unusual human activity detection using Markov Logic Networks}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947700}, doi = {10.1109/ISBA.2017.7947700}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/KapoorBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/KirchgasserU17, author = {Simon Kirchgasser and Andreas Uhl}, title = {Template ageing and quality analysis in time-span separated fingerprint data}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947680}, doi = {10.1109/ISBA.2017.7947680}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/KirchgasserU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/Lakshminarayana17, author = {Nagashri N. Lakshminarayana and Neeti Narayan and Nils Napp and Srirangaraj Setlur and Venu Govindaraju}, title = {A discriminative spatio-temporal mapping of face for liveness detection}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947707}, doi = {10.1109/ISBA.2017.7947707}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/Lakshminarayana17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/LambaN17, author = {Sonu Lamba and Neeta Nain}, title = {Multi-source approach for crowd density estimation in still images}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947682}, doi = {10.1109/ISBA.2017.7947682}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/LambaN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/LejbolleNM17, author = {Aske R. Lejb{\o}lle and Kamal Nasrollahi and Thomas B. Moeslund}, title = {Constraint patch matching for faster person re-identification}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947703}, doi = {10.1109/ISBA.2017.7947703}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/LejbolleNM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/RaghavendraRVCB17, author = {Ramachandra Raghavendra and Kiran B. Raja and Sushma Venkatesh and Faouzi Alaya Cheikh and Christoph Busch}, title = {On the vulnerability of extended Multispectral face recognition systems towards presentation attacks}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947698}, doi = {10.1109/ISBA.2017.7947698}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/RaghavendraRVCB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/RuchaudD17, author = {Natacha Ruchaud and Jean{-}Luc Dugelay}, title = {De-genderization by body contours reshaping}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947709}, doi = {10.1109/ISBA.2017.7947709}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/RuchaudD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SadhyaPYRKSS17, author = {Debanjan Sadhya and Parth Pahariya and Rishi Yadav and Apoorv Rastogi and Ayush Kumar and Lakshya Sharma and Sanjay Kumar Singh}, title = {BioSoft - a multimodal biometric database incorporating soft traits}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947693}, doi = {10.1109/ISBA.2017.7947693}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/SadhyaPYRKSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SemwalKN17, author = {Nancy Semwal and Abhijeet Kumar and Sakthivel Narayanan}, title = {Automatic speech emotion detection system using multi-domain acoustic feature selection and classification models}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947681}, doi = {10.1109/ISBA.2017.7947681}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/SemwalKN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SharmaHV17, author = {Monika Sharma and Ramya Hebbalaguppe and Lovekesh Vig}, title = {Pre-trained classifiers with One Shot Similarity for context aware face verification and identification}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947687}, doi = {10.1109/ISBA.2017.7947687}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/SharmaHV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ShenLSH17, author = {Chao Shen and Ruiyuan Lu and Saeid Samizade and Liang He}, title = {Passive fingerprinting for wireless devices: {A} multi-level decision approach}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947689}, doi = {10.1109/ISBA.2017.7947689}, timestamp = {Thu, 26 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/ShenLSH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SunCU17, author = {Yan Sun and Hayreddin {\c{C}}eker and Shambhu J. Upadhyaya}, title = {Anatomy of secondary features in keystroke dynamics - achieving more with less}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947691}, doi = {10.1109/ISBA.2017.7947691}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/SunCU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/UmerDC17, author = {Saiyed Umer and Bibhas Chandra Dhara and Bhabatosh Chanda}, title = {A novel palmprint recognition system using patch based filter response}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947688}, doi = {10.1109/ISBA.2017.7947688}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/UmerDC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/VermaSK17, author = {Hemant Kumar Verma and Arunav Saikia and Nitin Khanna}, title = {A hybrid model for {CFA} interpolation detection}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947705}, doi = {10.1109/ISBA.2017.7947705}, timestamp = {Thu, 15 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/VermaSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/YambayWSC17, author = {David Yambay and Brian Walczak and Stephanie Schuckers and Adam Czajka}, title = {LivDet-Iris 2015 - Iris Liveness Detection Competition 2015}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947701}, doi = {10.1109/ISBA.2017.7947701}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/YambayWSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ZhengXYL17, author = {He Zheng and Qiantong Xu and Yapeng Ye and Wenxin Li}, title = {Effects of meteorological factors on finger vein recognition}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947696}, doi = {10.1109/ISBA.2017.7947696}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/ZhengXYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ZhengYLNZHL17, author = {He Zheng and Yapeng Ye and Shilei Liu and Liao Ni and Yi Zhang and Houjun Huang and Wenxin Li}, title = {Parameter adjustment of finger vein recognition algorithms}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISBA.2017.7947697}, doi = {10.1109/ISBA.2017.7947697}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/ZhengYLNZHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isba/2017, title = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2017, New Delhi, India, February 22-24, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/7938565/proceeding}, isbn = {978-1-5090-5592-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/AbdulsattarC16, author = {Fatimah Shamsulddin Abdulsattar and John Carter}, title = {Performance analysis of gait recognition with large perspective distortion}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477229}, doi = {10.1109/ISBA.2016.7477229}, timestamp = {Mon, 17 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/AbdulsattarC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/AlmudhahkaNH16, author = {Nawaf Almudhahka and Mark S. Nixon and Jonathon S. Hare}, title = {Human face identification via comparative soft biometrics}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477246}, doi = {10.1109/ISBA.2016.7477246}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/AlmudhahkaNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/Blanco-GonzaloS16, author = {Ramon Blanco{-}Gonzalo and Raul S{\'{a}}nchez{-}Reillo and Carlos Sanchez{-}Redondo and Jose Luis Alonso{-}Aguilera}, title = {Accessibility evaluation of a mobile biometric recognition system}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477234}, doi = {10.1109/ISBA.2016.7477234}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/Blanco-GonzaloS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/BurgCB16, author = {Sebastian Burg and Pranav Channakeshava and Oliver Bringmann}, title = {Linebased end-to-display encryption for secure documents}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477242}, doi = {10.1109/ISBA.2016.7477242}, timestamp = {Fri, 29 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/BurgCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ChoLSXGX16, author = {Kun Woo Cho and Feng Lin and Chen Song and Xiaowei Xu and Fuxing Gu and Wenyao Xu}, title = {Thermal handprint analysis for forensic identification using Heat-Earth Mover's Distance}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477241}, doi = {10.1109/ISBA.2016.7477241}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/ChoLSXGX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/KrolPS16, author = {Kat Krol and Simon Parkin and M. Angela Sasse}, title = {"I don't like putting my face on the Internet!": An acceptance study of face biometrics as a {CAPTCHA} replacement}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477235}, doi = {10.1109/ISBA.2016.7477235}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/KrolPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/KumarRNB16, author = {Vijay Kumar and Ramachandra Raghavendra and Anoop M. Namboodiri and Christoph Busch}, title = {Robust transgender face recognition: Approach based on appearance and therapy factors}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477226}, doi = {10.1109/ISBA.2016.7477226}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/KumarRNB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/LiuWCZL16, author = {Liangchen Liu and Arnold Wiliem and Shaokang Chen and Kun Zhao and Brian C. Lovell}, title = {Determining the best attributes for surveillance video keywords generation}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477239}, doi = {10.1109/ISBA.2016.7477239}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/LiuWCZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/Martinho-Corbishley16, author = {Daniel Martinho{-}Corbishley and Mark S. Nixon and John N. Carter}, title = {Soft biometric retrieval to describe and identify surveillance images}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477240}, doi = {10.1109/ISBA.2016.7477240}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/Martinho-Corbishley16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/MondalB16, author = {Soumik Mondal and Patrick Bours}, title = {Combining keystroke and mouse dynamics for continuous user authentication and identification}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477228}, doi = {10.1109/ISBA.2016.7477228}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/MondalB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/MorochoMFV16, author = {Derlin Morocho and Aythami Morales and Julian Fi{\'{e}}rrez and Rub{\'{e}}n Vera{-}Rodr{\'{\i}}guez}, title = {Towards human-assisted signature recognition: Improving biometric systems through attribute-based recognition}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477227}, doi = {10.1109/ISBA.2016.7477227}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/MorochoMFV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/PatilBK16, author = {Ishan Patil and Shruti Bhilare and Vivek Kanhangad}, title = {Assessing vulnerability of dorsal hand-vein verification system to spoofing attacks using smartphone camera}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477232}, doi = {10.1109/ISBA.2016.7477232}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/PatilBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/QiZZHH16, author = {Yong Qi and Ya Zhou and Chang Zhou and Xinran Hu and Xiaoming Hu}, title = {Vein point cloud registration algorithm for multi-pose hand vein authentication}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477248}, doi = {10.1109/ISBA.2016.7477248}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/QiZZHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/RaghavendraRB16, author = {Ramachandra Raghavendra and Kiran B. Raja and Christoph Busch}, title = {Ear recognition after ear lobe surgery: {A} preliminary study}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477249}, doi = {10.1109/ISBA.2016.7477249}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/RaghavendraRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SarkarPC16, author = {Sayantan Sarkar and Vishal M. Patel and Rama Chellappa}, title = {Deep feature-based face detection on mobile devices}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477230}, doi = {10.1109/ISBA.2016.7477230}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/SarkarPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ShenCY16, author = {Chao Shen and Yufei Chen and Gengshan Yang}, title = {On motion-sensor behavior analysis for human-activity recognition via smartphones}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477231}, doi = {10.1109/ISBA.2016.7477231}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/ShenCY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SmerekaK016, author = {Jonathon M. Smereka and B. V. K. Vijaya Kumar and Andres Rodriguez}, title = {Selecting discriminative regions for periocular verification}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477247}, doi = {10.1109/ISBA.2016.7477247}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/SmerekaK016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SubramanyamJMP16, author = {Bharath Subramanyam and Piyush Joshi and Manoj Kumar Meena and Surya Prakash}, title = {Quality based classification of images for illumination invariant face recognition}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477245}, doi = {10.1109/ISBA.2016.7477245}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/SubramanyamJMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SuzukiKN16, author = {Shunsuke Suzuki and Mineichi Kudo and Atsuyoshi Nakamura}, title = {Sitting posture diagnosis using a pressure sensor mat}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477236}, doi = {10.1109/ISBA.2016.7477236}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/SuzukiKN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/TanakaOKHF16, author = {Shohei Tanaka and Akio Okazaki and Nobuko Kato and Hideitsu Hino and Kazuhiro Fukui}, title = {Spotting fingerspelled words from sign language video by temporally regularized canonical component analysis}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477238}, doi = {10.1109/ISBA.2016.7477238}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/TanakaOKHF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/Trokielewicz16, author = {Mateusz Trokielewicz}, title = {Iris recognition with a database of iris images obtained in visible light using smartphone camera}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477233}, doi = {10.1109/ISBA.2016.7477233}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/Trokielewicz16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/WangK16, author = {Tsung Ying Wang and Ajay Kumar}, title = {Recognizing human faces under disguise and makeup}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477243}, doi = {10.1109/ISBA.2016.7477243}, timestamp = {Mon, 02 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/WangK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/WuSK16, author = {Yuhang Wu and Shishir K. Shah and Ioannis A. Kakadiaris}, title = {Rendering or normalization? An analysis of the 3D-aided pose-invariant face recognition}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477244}, doi = {10.1109/ISBA.2016.7477244}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/WuSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/XuSK16, author = {Xiang Xu and Shishir K. Shah and Ioannis A. Kakadiaris}, title = {Face alignment via an ensemble of random ferns}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISBA.2016.7477237}, doi = {10.1109/ISBA.2016.7477237}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/XuSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isba/2016, title = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2016, Sendai, Japan, February 29 - March 2, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7469604/proceeding}, isbn = {978-1-4673-9727-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/CaoHZST15, author = {Dong Cao and Ran He and Man Zhang and Zhenan Sun and Tieniu Tan}, title = {Real-world gender recognition using multi-order {LBP} and localized multi-boost learning}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126350}, doi = {10.1109/ISBA.2015.7126350}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/CaoHZST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ChenSCF15, author = {Jianxu Chen and Feng Shen and Danny Ziyi Chen and Patrick J. Flynn}, title = {Iris recognition based on human-interpretable features}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126352}, doi = {10.1109/ISBA.2015.7126352}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/ChenSCF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ElliottOBRG15, author = {Stephen J. Elliott and Kevin O'Connor and Eric Bartlow and Joshua J. Robertson and Richard M. Guest}, title = {Expanding the human-biometric sensor interaction model to identity claim scenarios}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126362}, doi = {10.1109/ISBA.2015.7126362}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/ElliottOBRG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/FernandoM15, author = {Jeffry Bonar Fernando and Koji Morikawa}, title = {Improvement of human identification accuracy by wavelet of peak-aligned {ECG}}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126358}, doi = {10.1109/ISBA.2015.7126358}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/FernandoM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/GongFLF15, author = {Xun Gong and Zehua Fu and Xinxin Li and Lin Feng}, title = {A two-stage estimation method for depth estimation of facial landmarks}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126355}, doi = {10.1109/ISBA.2015.7126355}, timestamp = {Wed, 05 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/GongFLF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/GuiJRLX15, author = {Qiong Gui and Zhanpeng Jin and Maria V. Ruiz{-}Blondet and Sarah Laszlo and Wenyao Xu}, title = {Towards {EEG} biometrics: pattern matching approaches for user identification}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126357}, doi = {10.1109/ISBA.2015.7126357}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/GuiJRLX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/HaleviKCM15, author = {Tzipora Halevi and Trishank Karthik Kuppusamy and Meghan Caiazzo and Nasir D. Memon}, title = {Investigating users' readiness to trade-off biometric fingerprint data}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126366}, doi = {10.1109/ISBA.2015.7126366}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/HaleviKCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/HuangHSH15, author = {Jiaju Huang and Daqing Hou and Stephanie Schuckers and Zhenhao Hou}, title = {Effect of data size on performance of free-text keystroke authentication}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126361}, doi = {10.1109/ISBA.2015.7126361}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/HuangHSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/IdrusCRMB15, author = {Syed Zulkarnain Syed Idrus and Estelle Cherrier and Christophe Rosenberger and Soumik Mondal and Patrick Bours}, title = {Keystroke dynamics performance enhancement with soft biometrics}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126345}, doi = {10.1109/ISBA.2015.7126345}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/IdrusCRMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/JainMGVS15, author = {Aishwarya Jain and Paritosh Mittal and Gaurav Goswami and Mayank Vatsa and Richa Singh}, title = {Person identification at a distance via ocular biometrics}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126353}, doi = {10.1109/ISBA.2015.7126353}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/JainMGVS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/JoshiP15, author = {Piyush Joshi and Surya Prakash}, title = {An efficient technique for image contrast enhancement using artificial bee colony}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126363}, doi = {10.1109/ISBA.2015.7126363}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/JoshiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/LiWCYZ15, author = {Xiang Li and Ancong Wu and Mei Cao and Jinjie You and Wei{-}Shi Zheng}, title = {Towards more reliable matching for person re-identification}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126349}, doi = {10.1109/ISBA.2015.7126349}, timestamp = {Thu, 12 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/LiWCYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/LiYB15, author = {Guoqiang Li and Bian Yang and Christoph Busch}, title = {A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126346}, doi = {10.1109/ISBA.2015.7126346}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/LiYB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/LiYZY15, author = {Bin Li and Zifei Yan and Wangmeng Zuo and Feng Yue}, title = {Modeling the individuality of iris pattern and the effectiveness of inconsistent bit masking strategy}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126351}, doi = {10.1109/ISBA.2015.7126351}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/LiYZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/MondalB15, author = {Soumik Mondal and Patrick Bours}, title = {Context independent continuous authentication using behavioural biometrics}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126342}, doi = {10.1109/ISBA.2015.7126342}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/MondalB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/NganG15, author = {Mei Ngan and Patrick Grother}, title = {Tattoo recognition technology - challenge (Tatt-C): an open tattoo database for developing tattoo recognition research}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126369}, doi = {10.1109/ISBA.2015.7126369}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/NganG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/RaghavendraSB15, author = {Ramachandra Raghavendra and Jayachander Surbiryala and Christoph Busch}, title = {An efficient finger vein indexing scheme based on unsupervised clustering}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126343}, doi = {10.1109/ISBA.2015.7126343}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/RaghavendraSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/RissacherG15, author = {Dan Rissacher and Dan Galy}, title = {Cardiac radar for biometric identification using nearest neighbour of continuous wavelet transform peaks}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126356}, doi = {10.1109/ISBA.2015.7126356}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/RissacherG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/Ruiz-BlondetLJ15, author = {Maria V. Ruiz{-}Blondet and Sarah Laszlo and Zhanpeng Jin}, title = {Assessment of permanence of non-volitional {EEG} brainwaves as a biometric}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126359}, doi = {10.1109/ISBA.2015.7126359}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/Ruiz-BlondetLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/Sae-BaeM15, author = {Napa Sae{-}Bae and Nasir D. Memon}, title = {Quality of online signature templates}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126354}, doi = {10.1109/ISBA.2015.7126354}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isba/Sae-BaeM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ShakeelK15, author = {M. Saad Shakeel and Wenxiong Kang}, title = {Efficient blind image deblurring method for palm print images}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126364}, doi = {10.1109/ISBA.2015.7126364}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/ShakeelK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ShenPYG15, author = {Chao Shen and Shichao Pei and Tianwen Yu and Xiaohong Guan}, title = {On motion sensors as source for user input inference in smartphones}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126368}, doi = {10.1109/ISBA.2015.7126368}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/ShenPYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ShikkenawisM15, author = {Gitam Shikkenawis and Suman K. Mitra}, title = {Locality Preserving Discriminant Projection}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126365}, doi = {10.1109/ISBA.2015.7126365}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/ShikkenawisM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SmithWL15, author = {Daniel F. Smith and Arnold Wiliem and Brian C. Lovell}, title = {Binary watermarks: a practical method to address face recognition replay attacks on consumer mobile devices}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126344}, doi = {10.1109/ISBA.2015.7126344}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/SmithWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/SubramanianSLCE15, author = {Ravichandran Subramanian and Sudeep Sarkar and Miguel A. Labrador and Kristina Contino and Christopher Eggert and Omar Javed and Jiejie Zhu and Hui Cheng}, title = {Orientation invariant gait matching algorithm based on the Kabsch alignment}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126347}, doi = {10.1109/ISBA.2015.7126347}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/SubramanianSLCE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/TalebiG15, author = {Hossein Talebi and Marina L. Gavrilova}, title = {Prior resemblance probability of users for multimodal biometrics rank fusion}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126360}, doi = {10.1109/ISBA.2015.7126360}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/TalebiG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/YaoVCR15, author = {Zhigang Yao and Beno{\^{\i}}t Vibert and Christophe Charrier and Christophe Rosenberger}, title = {Blind minutiae selection for standard minutiae templates}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126367}, doi = {10.1109/ISBA.2015.7126367}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/YaoVCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/ZhaoWL15, author = {Kun Zhao and Arnold Wiliem and Brian C. Lovell}, title = {Kernelised orthonormal random projection on grassmann manifolds with applications to action and gait-based gender recognition}, booktitle = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISBA.2015.7126348}, doi = {10.1109/ISBA.2015.7126348}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/ZhaoWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isba/2015, title = {{IEEE} International Conference on Identity, Security and Behavior Analysis, {ISBA} 2015, Hong Kong, China, March 23-25, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7118006/proceeding}, isbn = {978-1-4799-1974-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isba/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.